词汇 | example_english_cryptanalyst |
释义 | Examples of cryptanalystThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Finally, in a chosen-ciphertext attack, the cryptanalyst may be able to "choose" ciphertexts and learn their corresponding plaintexts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once every letter in the key is known, the cryptanalyst can simply decrypt the ciphertext and reveal the plaintext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once the length of the keyword is discovered, the cryptanalyst lines up the ciphertext in "n" columns, where "n" is the length of the keyword. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A cryptanalyst would prepare a crib for comparison with the ciphertext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In refining down the set of stops for further examination, the cryptanalyst would eliminate stops that contained such a contradiction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The cryptanalyst hypothesised one plugboard interconnection for the bombe to test. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. They settled on one, and agreed to write up a complete design and have it reviewed by another cryptanalyst by the following day. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In classical cryptography a "null" is intended to confuse the cryptanalyst. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The message settings should never have been re-used, but on occasion they were, providing a depth, which could be utilised by a cryptanalyst. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once a suitable crib had been decided upon, the cryptanalyst would produce a "menu" for wiring up the bombe to test the crib against the ciphertext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Provided the message is of reasonable length (see below), the cryptanalyst can deduce the probable meaning of the most common symbols by analyzing the frequency distribution of the ciphertextfrequency analysis. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Although frequency analysis is a powerful and general technique against many ciphers, encryption has still often been effective in practice, as many a would-be cryptanalyst was unaware of the technique. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The primary use of padding with classical ciphers is to prevent the cryptanalyst from using that predictability to find cribs that aid in breaking the encryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The basic principle of this sort of enciphering machine is that it should deliver a very long stream of transformations that are difficult for a cryptanalyst to predict. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Using these relationships, a cryptanalyst could reason from one to another and, potentially, derive a logical contradiction, in which case the rotor setting under consideration could be ruled out. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Consequently, to break this cipher, the cryptanalyst first had to determine the number of columns of the square and then use common letter combinations to guess at their original order. Badly chosen routes will leave excessive chunks of plaintext, or text simply reversed, and this will give cryptanalysts a clue as to the routes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Even before this, though, some skilled cryptanalysts could occasionally break the cipher in the 16th century. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Later cryptanalysts did not require linguistic training, so could be recruited and put to work directly. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. With a bit of luck, experienced cryptanalysts have been able to break polyalphabetic ciphers for centuries. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In the final moments before the objects arrive, a fax comes through from the cryptanalysts, having decoded the alien's original message. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Skill at solving crossword puzzles was famously tested in recruiting some cryptanalysts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The cryptanalyst has to rule out the coincidences to find the correct length. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. After this, his professional responsibilities as a senior cryptanalyst limited his top-class appearances. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A cryptanalyst must break both ciphers to get any information. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The ciphertext-only attack model is the weakest because it implies that the cryptanalyst has nothing but ciphertext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Any suspicion of its use can lead to discoveries of hidden messages where no hidden messages exist at all, thus confusing the cryptanalyst. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To a cryptanalyst the messages are then said to be "in depth". From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Generally, the cryptanalyst may benefit from lining up identical enciphering operations among a set of messages. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To attack the cipher, a cryptanalyst runs guessed probable plaintexts along the ciphertext, subtracting them out from each possible position. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。